Lesson 1: Being a Hacker
1.0 Introduction1.1 Resources
1.1.1 Books
1.1.2 Magazines and Newspapers
1.1.3 Zines and Blogs
1.1.4 Forums and Mailing Lists
1.1.5 Newsgroups
1.1.6 Websites
1.1.7 Chat
1.1.8 P2P
1.2 Further Lessons
2.1. Introduction and Objectives
2.2. Requirements and Setup
2.2.1 Requirements
2.2.2 Setup
2.3. System Operation: WINDOWS
2.3.1 How to open an MS-DOS window
2.3.2 Commands and tools (Windows)
2.4. System Operations: Linux
2.4.1 How to open a console window
2.4.2 Commands and tools (Linux)
3.1 Introduction
3.2 Basic concepts of networks
3.2.1 Devices
3.2.2 Topologies
3.3 TCP/IP model
3.3.1 Introduction
3.3.2 Layers
3.3.2.1 Application
3.3.2.2 Transport
3.3.2.3 Internet
3.3.2.4 Network Access
3.3.3 Protocols
3.3.3.1 Application layer protocols
3.3.3.2 Transport layer Protocols
3.3.3.3 Internet layer Protocols
3.3.4 IP Addresses
3.3.5 Ports
Lesson 4: Services and Connections
4.0 Introduction
4.1 Services
4.1.1 HTTP and The Web
4.1.2 E-Mail – POP and SMTP
4.1.3 IRC
4.1.4 FTP
4.1.5 Telnet and SSH
4.1.6 DNS
4.1.7 DHCP
4.2 Connections
4.2.1 ISPs
4.2.2 Plain Old Telephone Service
4.2.3 DSL
4.2.4 Cable Modems
5.0 Introduction
5.1 Identifying a Server
5.1.1 Identifying the Owner of a domain
5.1.2 Identifying the IP address of a domain
5.2 Identifying Services
5.2.1 Ping and TraceRoute
5.2.2 Banner Grabbing
5.2.3 Identifying Services from Ports and Protocols
5.3 System Fingerprinting
5.3.1 Scanning Remote Computers
6.0 Introduction
6.1 Viruses (Virii)
6.1.1 Introduction
6.1.2 Description
6.1.2.1 Boot Sector Viruses
6.1.2.2 The Executable File Virus
6.1.2.3 The Terminate and Stay Resident (TSR) Virus
6.1.2.4 The Polymorphic Virus
6.1.2.5 The Macro Virus
6.2 Worms
6.2.1 Introduction
6.2.2 Description
6.3 Trojans and Spyware
6.3.1 Introduction
6.3.2 Description
6.4 Rootkits and Backdoors
6.4.1 Introduction
6.4.2 Description
6.5 Logicbombs and Timebombs
6.5.1 Introduction
6.5.2 Description
6.6 Countermeasures
6.6.1 Introduction
6.6.2 Anti-Virus
6.6.3 NIDS
6.6.4 HIDS
6.6.5 Firewalls
6.6.6 Sandboxes
6.7 Good Safety Advice
7.0 Introduction
7.1 Netstat and Host Application Firewalls
7.1.1 Netstat
7.1.2 Firewalls
7.2 Packet Sniffers
7.2.1 Sniffing
7.2.2 Decoding Network Traffic
7.2.3 Sniffing Other Computers
7.2.4 Intrusion Detection Systems
7.3 Honeypots and Honeynets
7.3.1 Types of Honeypots
7.3.2 Building a Honeypot
8.0 Introduction
8.1 Forensic Principals
8.1.0 Introduction
8.1.1 Avoid Contaminiation
8.1.2 Act Methodically
8.1.3 Chain of Evidence
8.1.4 Conclusion
8.2 Stand-alone Forensics
8.2.0 Introduction
8.2.1 Hard Drive and Storage Media Basics
8.2.2 Encryption, Decryption and File Formats
8.2.3 Finding a Needle in a Haystack
8.2.3.1 find
8.2.3.2 grep
8.2.3.3 strings
8.2.3.4 awk
8.2.3.5 The Pipe “|”
8.2.4 Making use of other sources
8.3 Network Forensics
8.3.0 Introduction
8.3.1 Firewall Logs
Lesson 9: Email Security
9.0 Introduction9.1 How E-mail Works
9.1.1 E-mail Accounts
9.1.2 POP and SMTP
9.1.3 Web Mail
9.2 Safe E-mail Usage Part 1: Receiving
9.2.1 Spam, Phishing and Fraud
9.2.2 HTML E-Mail
9.2.3 Attachment Security
9.2.4 Forged headers
9.3 Safe E-mail Usage Part 2: Sending
9.3.1 Digital Certificates
9.3.2 Digital Signatures
9.3.3 Getting a certificate
9.3.4 Encryption
9.3.5 How does it work?
9.3.6 Decryption
9.3.7 Is Encryption Unbreakable?
9.4 Connection Security
10.1 Fundamentals of Web Security
10.1.1 How the web really works
10.1.2 Rattling the Locks
10.1.3 Looking through Tinted Windows - SSL
10.1.4 Having someone else do it for you – Proxies
10.2 Web Vulnerabilities
10.2.1 Scripting Languages
10.2.2 Top Ten Most Critical Web Application Vulnerabilities
10.2.3 Security Guidelines for Building Secure Web Applications
10.3 HTML Basics – A brief introduction
10.3.1 Reading HTML
10.3.2 Viewing HTML at its Source
10.3.3 Links
10.3.4 Proxy methods for Web Application Manipulation
10.4 Protecting your server
10.4.1 Firewall
10.4.2 Intrusion Detection System (IDS)
10.5 Secure Communications
10.5.1 Privacy and Confidentiality
10.5.2 Knowing if you are communicating securely
10.6 Methods of Verification
10.6.1 OSSTMM
10.6.2 OWASP
Lesson 11: Passwords
11.0 Introduction11.1 Types of Passwords
11.1.1 Strings of Characters
11.1.2 Strings of Characters plus a token
11.1.3 Biometric Passwords
11.2 History of Passwords
11.3 Build a Strong Password
11.4 Password Encryption
11.5 Password Cracking (Password Recovery)
11.6 Protection from Password Cracking
12.1. Introduction
12.2. Foreign crimes versus local rights
12.3. Crimes related to the TICs
12.4. Prevention of Crimes and Technologies of double use
12.4.1. The global systems of monitoring: concept "COMINT"
12.4.2. "ECHELON" System
12.4.3. The "CARNIVORE" system
12.5. Ethical Hacking
12.6. The 10 most common internet frauds
